Jump to content

Cybercrime

From Simple English Wikipedia, the free encyclopedia

Cybercrime is crime that uses acomputerandcomputer network.There are many types of cybercrimes. These includedoxxing,hacking,copyrightissues,cyberterrorismandfraud.[1]Many countries have laws against many types of onlinepornography.[2]Some other actions can also be illegal such ascyberbullying,spying,child groomingorhebephilicbehavior.[3]Some governments have agencies that deal with computer crimes.[4]

Cybercrime can include many different types of profit-driven criminal activity, includingransomwareattacks, email and internet fraud, and identity fraud, as well as attempts to steal financial accounts,credit cardor other payment card information.[5]Cybercriminals may also target an individual's private information, as well as corporate data for theft and resale.[6][7]

Cybercrime attacks can begin wherever there is digital data, opportunity and motive. Cybercriminals include everyone from the lone user engaged in cyberbullying to state-sponsored actors, like China'sintelligence services.Cybercrimes generally do not occur in a vacuum; they are, in many ways, distributed in nature. That is, cybercriminals typically rely on other actors to complete the crime. This is whether it's the creator ofmalwareusing thedark webto sell code, the distributor of illegalpharmaceuticals,usingcryptocurrencybrokers to hold virtual money inescrowor state threat actors relying on technology subcontractors to stealintellectual property(IP).[8]

Cyber crimes can generally be divided into two categories:[9]

[change|change source]
Crimes that target networks or devices Crimes using devices to participate in criminal activities
Viruses PhishingEmails
Malware Cyberstalking
DoS Attacks Identity theft

References

[change|change source]
  1. Anderson, Ross, et al. "Measuring the cost of cybercrime." The economics of information security and privacy. Springer Berlin Heidelberg, 2013. 265-300.
  2. Urbas, Gregor. "Protecting children from online predators: The use of covert investigation techniques by law enforcement." Journal of Contemporary Criminal Justice 26.4 (2010): 410-425
  3. Edwards, Susan SM. "Cyber-Grooming Young Women for Terrorist Activity: Dominant and Subjugated Explanatory Narratives." Cybercrime, Organized Crime, and Societal Responses. Springer International Publishing, 2017. 23-46.
  4. Levi, Michael, and Matthew Leighton Williams. "Multi-agency partnerships in cybercrime reduction: Mapping the UK information assurance network cooperation space." Information Management & Computer Security 21.5 (2013): 420-443
  5. kashif, abbas."Businesses are increasingly susceptible to cyber-attacks, and Accountants must now consider cyber security as part of their day-to-day work".hmaa.ae.Retrieved2023-06-05.[permanent dead link]
  6. Williams, Jessica (2020-02-15)."The Effects of Weak Cybersecurity".Retrieved2021-09-04.
  7. Marlett, Gregory (2021-08-04)."Protect your business from cyberthreats".Technology Solutions.Retrieved2022-07-15.
  8. Brush, Kate."How cybercrime works".SearchSecurity.Retrieved2021-09-04.
  9. says, Sourabh (2018-08-20)."Types of Cybercrime - Panda Security".Panda Security Mediacenter.Retrieved2019-03-16.

Other page

[change|change source]